521 – 530 of 540
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 1999
-
Mark
Incremental authentication of tree-structured documents
(1999) 2nd International Conference on Information and Communication Security, ICICS 1999 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1726. p.275-283
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Segmentation of echocardiographic image sequences using spatio-temporal information
(1999) 2nd International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 1999 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1679. p.410-419
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1998
-
Mark
Reduced complexity correlation attacks on two clock-controlled generators
(1998) International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT’98 1514. p.342-356
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1997
-
Mark
Registration of abdominal CT and SPECT images using Compton scatter data
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Bucket hashing with a small key size'
(1997) nternational Conference on the Theory and Application of Cryptographic Techniques EUROCRYPT ’97 1233. p.149-162
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Almost k-wise independent sample spaces and their cryptologic applications
(1997) International Conference on the Theory and Application of Cryptographic Techniques - EUROCRYPT'97 1233. p.409-421
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A digital signature scheme based on random error-correcting codes
(1997) 6th IMA International Conference on Cryptography and Coding, 1997 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1355. p.161-167
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast message authentication using efficient polynomial evaluation
(1997) 4th International Workshop on Fast Software Encryption, FSE 1997 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1267. p.190-204
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1996
-
Mark
Universal hash functions from exponential sums over finite fields and Galois rings
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1995
-
Mark
Fast exponentation in cryptography
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
